| Document Date: 2014-09-01 09:06:37 Open Document File Size: 369,94 KBShare Result on Facebook
City Scottsdale / / Company Computer-Communication Networks / / Country United States / / Currency pence / USD / / / Event FDA Phase / Product Recall / Product Issues / Product Release / / IndustryTerm malicious server / secure protocols / uses algorithm / constant round protocol / semihonest garbled circuit protocol / unfair secure computation protocol / secure computation protocols / verifiable covert secure protocols / non-uniform polynomial-time algorithm / randomized key generation algorithm / incentivizable protocol / bounty protocol / above solution / garbled circuit computing Φx / fair protocols / naïve solution / secure computation protocol / polynomial-time algorithms / lottery protocols / probabilistic polynomialtime n-party protocol / secure protocol / deterministic verification algorithm / reputation systems / computation protocol / optimistic protocols / tion algorithm / deterministic worker algorithm / bounty maker / / OperatingSystem DoS / / Organization Pi / Clearly / g20 / Pj / Technion / / Person Tokenj / C. Furthermore / Keywords Bitcoin / Iddo Bentov Technion / Ranjit Kumaresan / / Position extractor / trusted arbiter/supervisor / malicious miner / collector / miner / PPT extractor / bounty collector / General / wB / circuit evaluator / malicious worker / candidate / / Product FexitCR / leak / Huang / FCR / SHA256d / P1 / P2 / FOT / / ProvinceOrState Arizona / / Technology tion algorithm / DualEx protocol / probabilistic polynomialtime n-party protocol / three polynomial-time algorithms / secure computation protocols / unfair secure computation protocol / extractable witness encryption / bounty protocol / incentivizable protocol / two protocols / following two polynomial-time algorithms / secure computation protocol / Bitcoin protocol / semihonest garbled circuit protocol / 1 uses algorithm / Verify algorithm / encryption / cryptography / Compute algorithm / KeyGen algorithm / deterministic verification algorithm / unfair secure MPC protocol / deterministic worker algorithm / Our protocol / witness encryption / constant round protocol / computation protocol / lottery protocols / time-locked encryption / simulation / non-uniform polynomial-time algorithm / secure protocol / randomized key generation algorithm / publicly verifiable covert secure protocols / design protocols / / URL http /
SocialTag |